HomeSort by relevance Sort by last modified time
    Searched refs:iph1 (Results 1 - 23 of 23) sorted by null

  /external/ipsec-tools/src/racoon/
isakmp_ident.c 107 ident_i1send(iph1, msg)
108 struct ph1handle *iph1;
133 if (iph1->status != PHASE1ST_START) {
135 "status mismatched %d.\n", iph1->status);
140 memset(&iph1->index, 0, sizeof(iph1->index));
141 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
144 iph1->sa = ipsecdoi_setph1proposal(iph1->rmconf->proposal)
    [all...]
isakmp_agg.c 111 agg_i1send(iph1, msg)
112 struct ph1handle *iph1;
145 if (iph1->status != PHASE1ST_START) {
147 "status mismatched %d.\n", iph1->status);
152 memset(&iph1->index, 0, sizeof(iph1->index));
153 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
156 if (ipsecdoi_setid1(iph1) < 0
    [all...]
isakmp_base.c 103 base_i1send(iph1, msg)
104 struct ph1handle *iph1;
131 if (iph1->status != PHASE1ST_START) {
133 "status mismatched %d.\n", iph1->status);
138 memset(&iph1->index, 0, sizeof(iph1->index));
139 isakmp_newcookie((caddr_t)&iph1->index, iph1->remote, iph1->local);
142 if (ipsecdoi_setid1(iph1) < 0
    [all...]
isakmp_inf.c 124 isakmp_info_recv(iph1, msg0)
125 struct ph1handle *iph1;
150 if (iph1->ivm == NULL) {
151 plog(LLV_ERROR, LOCATION, NULL, "iph1->ivm == NULL\n");
156 ivm = oakley_newiv2(iph1, ((struct isakmp *)msg0->v)->msgid);
160 msg = oakley_do_decrypt(iph1, msg0, ivm->iv, ivm->ive);
188 if (iph1->status != PHASE1ST_ESTABLISHED) {
230 hash = oakley_compute_hash1(iph1, isakmp->msgid, payload);
263 switch (iph1->etype) {
267 if ((iph1->side == INITIATOR && iph1->status < PHASE1ST_MSG3SENT
624 struct ph1handle *iph1; local
698 struct ph1handle *iph1 = NULL; local
839 struct ph1handle *iph1 = iph2->ph1; local
1104 struct ph1handle *iph1; local
1615 struct ph1handle *iph1 = arg; local
    [all...]
isakmp_newg.c 69 isakmp_newgroup_r(iph1, msg)
70 struct ph1handle *iph1;
102 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL);
103 plog(LLV_ERROR, LOCATION, iph1->remote,
113 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL);
114 plog(LLV_ERROR, LOCATION, iph1->remote,
123 handle_vendorid(iph1, pa->ptr);
126 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL);
127 plog(LLV_ERROR, LOCATION, iph1->remote,
138 isakmp_info_send_n1(iph1, ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE, NULL)
    [all...]
handler.c 221 struct ph1handle *iph1; local
227 LIST_FOREACH(iph1, &ph1tree, chain)
238 LIST_FOREACH(iph1, &ph1tree, chain) {
239 memcpy(&pd->index, &iph1->index, sizeof(iph1->index));
240 pd->status = iph1->status;
241 pd->side = iph1->side;
242 memcpy(&pd->remote, iph1->remote, sysdep_sa_len(iph1->remote));
243 memcpy(&pd->local, iph1->local, sysdep_sa_len(iph1->local))
260 struct ph1handle *iph1; local
1081 struct ph1handle *iph1; local
    [all...]
nattraversal.h 45 #define NATT_AVAILABLE(ph1) ((iph1)->natt_flags & NAT_ANNOUNCED)
50 #define NON_ESP_MARKER_USE(iph1) ((iph1)->natt_flags & NAT_ADD_NON_ESP_MARKER)
78 vchar_t *natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr);
79 int natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received, int natd_seq);
82 void natt_float_ports (struct ph1handle *iph1);
83 void natt_handle_vendorid (struct ph1handle *iph1, int vid_numeric);
93 int natt_keepalive_add_ph1 (struct ph1handle *iph1);
oakley.c 131 static int oakley_check_certid __P((struct ph1handle *iph1));
375 oakley_prf(key, buf, iph1)
377 struct ph1handle *iph1;
382 if (iph1->approval == NULL) {
389 type = iph1->approval->hashtype;
405 oakley_hash(buf, iph1)
407 struct ph1handle *iph1;
412 if (iph1->approval == NULL) {
419 type = iph1->approval->hashtype;
683 oakley_compute_hashx(struct ph1handle *iph1, ...
    [all...]
isakmp_cfg.c 139 isakmp_cfg_r(iph1, msg)
140 struct ph1handle *iph1;
170 if (iph1->mode_cfg->ivm == NULL ||
171 iph1->mode_cfg->last_msgid != packet->msgid )
172 iph1->mode_cfg->ivm =
173 isakmp_cfg_newiv(iph1, packet->msgid);
174 ivm = iph1->mode_cfg->ivm;
176 dmsg = oakley_do_decrypt(iph1, msg, ivm->iv, ivm->ive);
228 if ((check = oakley_compute_hash1(iph1,
251 isakmp_cfg_attr_r(iph1, packet->msgid, attrpl)
    [all...]
gssapi.c 154 gssapi_get_default_name(struct ph1handle *iph1, int remote, gss_name_t *service)
162 sa = remote ? iph1->remote : iph1->local;
187 gssapi_init(struct ph1handle *iph1)
203 gssapi_set_state(iph1, gps);
205 if (iph1->rmconf->proposal->gssid != NULL) {
206 id_token.length = iph1->rmconf->proposal->gssid->l;
207 id_token.value = iph1->rmconf->proposal->gssid->v;
212 gssapi_free_state(iph1);
216 gssapi_get_default_name(iph1, 0, &princ)
    [all...]
isakmp.c 404 struct ph1handle *iph1; local
459 iph1 = getph1byindex(index);
460 if (iph1 != NULL) {
463 iph1->side == INITIATOR) {
472 if (NATT_AVAILABLE(iph1) &&
473 ! (iph1->natt_flags & NAT_PORTS_CHANGED) &&
474 ((cmpsaddrstrict(iph1->remote, remote) != 0) ||
475 (cmpsaddrstrict(iph1->local, local) != 0)))
478 racoon_free(iph1->remote);
479 racoon_free(iph1->local)
1026 struct ph1handle *iph1; local
1124 struct ph1handle *iph1; local
1869 struct ph1handle *iph1; local
2151 struct ph1handle *iph1 = NULL; local
2285 struct ph1handle *iph1; local
    [all...]
nattraversal.c 122 natt_hash_addr (struct ph1handle *iph1, struct sockaddr *addr)
131 saddr2str(addr), iph1->approval->hashtype,
132 (iph1->rmconf->nat_traversal == NATT_FORCE)?"(NAT-T forced)":"");
158 memcpy (ptr, iph1->index.i_ck, sizeof (cookie_t));
162 memcpy (ptr, iph1->index.r_ck, sizeof (cookie_t));
166 if (iph1->rmconf->nat_traversal == NATT_FORCE)
175 natd = oakley_hash (buf, iph1);
182 natt_compare_addr_hash (struct ph1handle *iph1, vchar_t *natd_received,
189 if (iph1->rmconf->nat_traversal == NATT_FORCE)
193 natd_computed = natt_hash_addr (iph1, iph1->local)
    [all...]
oakley.h 228 #define AUTHMETHOD(iph1) \
229 (((iph1)->rmconf->xauth && \
230 (iph1)->approval->authmethod == OAKLEY_ATTR_AUTH_METHOD_XAUTH_PSKEY_I) ? \
231 FICTIVE_AUTH_METHOD_XAUTH_PSKEY_I : (iph1)->approval->authmethod)
232 #define RMAUTHMETHOD(iph1) \
233 (((iph1)->rmconf->xauth && \
234 (iph1)->rmconf->proposal->authmethod == \
237 (iph1)->rmconf->proposal->authmethod)
239 #define AUTHMETHOD(iph1) (iph1)->approval->authmetho
    [all...]
isakmp_xauth.c 120 xauth_sendreq(iph1)
121 struct ph1handle *iph1;
128 struct xauth_state *xst = &iph1->mode_cfg->xauth;
132 if (iph1->status != PHASE1ST_ESTABLISHED) {
175 isakmp_cfg_send(iph1, buffer,
186 xauth_attr_reply(iph1, attr, id)
187 struct ph1handle *iph1;
194 struct xauth_state *xst = &iph1->mode_cfg->xauth;
196 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_XAUTH) == 0) {
265 strncpy(iph1->mode_cfg->login, usr, LOGINLEN)
361 struct ph1handle *iph1; local
    [all...]
isakmp_unity.c 86 isakmp_unity_req(iph1, attr)
87 struct ph1handle *iph1;
93 if ((iph1->mode_cfg->flags & ISAKMP_CFG_VENDORID_UNITY) == 0) {
144 reply_attr = isakmp_cfg_string(iph1, attr, buf);
150 reply_attr = isakmp_cfg_short(iph1, attr,
155 reply_attr = isakmp_cfg_short(iph1, attr,
160 reply_attr = isakmp_cfg_copy(iph1, attr);
164 reply_attr = isakmp_cfg_string(iph1,
170 reply_attr = isakmp_cfg_split(iph1, attr,
178 reply_attr = isakmp_cfg_split(iph1, attr
    [all...]
isakmp_frag.c 82 isakmp_sendfrags(iph1, buf)
83 struct ph1handle *iph1;
134 set_isakmp_header1(frag, iph1, ISAKMP_NPTYPE_FRAG);
151 if (isakmp_send(iph1, frag) < 0) {
177 isakmp_frag_extract(iph1, msg)
178 struct ph1handle *iph1;
231 if (iph1->frag_chain == NULL) {
232 iph1->frag_chain = item;
236 current = iph1->frag_chain;
248 item = iph1->frag_chain
    [all...]
rsalist.c 128 struct ph1handle *iph1; member in struct:lookup_result
140 local_score = naddr_score(key->src, req->iph1->local);
141 remote_score = naddr_score(key->dst, req->iph1->remote);
163 rsa_lookup_keys(struct ph1handle *iph1, int my)
169 saddr2str_fromto("%s <-> %s", iph1->local, iph1->remote));
171 r.iph1 = iph1;
176 list = iph1->rmconf->rsa_private;
178 list = iph1->rmconf->rsa_public
    [all...]
rsalist.h 58 struct genlist *rsa_lookup_keys(struct ph1handle *iph1, int my);
vendorid.c 251 handle_vendorid(struct ph1handle *iph1, struct isakmp_gen *gen)
261 natt_handle_vendorid(iph1, vid_numeric);
266 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_XAUTH;
269 iph1->mode_cfg->flags |= ISAKMP_CFG_VENDORID_UNITY;
277 (iph1->rmconf == NULL || iph1->rmconf->dpd)) {
278 iph1->dpd_support = 1;
admin.c 275 struct ph1handle *iph1; local
292 if ((iph1 = getph1byaddrwop(src, dst)) == NULL) {
296 if (iph1->status == PHASE1ST_ESTABLISHED)
297 isakmp_info_send_d1(iph1);
298 purge_remote(iph1);
309 struct ph1handle *iph1; local
331 struct ph1handle *iph1; local
345 while ((iph1 = getph1bydstaddrwop(dst)) != NULL) {
346 loc = racoon_strdup(saddrwop2str(iph1->local));
349 if (iph1->status == PHASE1ST_ESTABLISHED
    [all...]
ipsec_doi.c 172 * the pointer to one of isakmpsa in proposal is set into iph1->approval.
179 ipsecdoi_checkph1proposal(sa, iph1)
181 struct ph1handle *iph1;
192 newsa = get_ph1approval(iph1, pair);
199 iph1->sa_ret = newsa;
209 get_ph1approval(iph1, pair)
210 struct ph1handle *iph1;
219 if (iph1->approval) {
220 delisakmpsa(iph1->approval);
221 iph1->approval = NULL
    [all...]
isakmp_var.h 112 struct ph1handle *iph1));
  /external/iputils/
ping6.c 1638 struct ip6_hdr *iph1 = (struct ip6_hdr*)(icmph+1); local
    [all...]

Completed in 147 milliseconds